How I Would Learn Cyber Security If I Could Start Over Want to learn all about cyber-security and become an ethical hacker? His thoughts on the basics and fundamentals is so right on. Networking, User or Desktop support, Server maintenance, whatever. I firmly believe that the best security people started in IT originally. Experience on Read More …
Category: Hacker TV
Hacker Videos
LLM Vulnerability Scanning with Garrick
This video provides a tutorial on using Garrick, a large language model vulnerability scanner, to test custom chat bots. Garrick employs probes (test cases) and detectors to identify vulnerabilities, drawing from a large, constantly updated probe library. The tutorial focuses on testing a simple chat application called Wy chat, which utilizes Llama 3 and the Read More …
Hacker TV – Start Web App Pentesting
Looking to step up your web app pentesting and bug bounty skills? In this video, Alex from TCM Security walks you through some of the best FREE tools and resources to help you sharpen your AppSec knowledge and techniques. Whether you’re just starting out or looking to boost your skill set, these tools are must-haves!
hacker TV – Understanding buffer overflow exploitation
The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell Everything started with Aleph One’s paper “Smashing the Stack for Fun and Profit”. These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb Read More …
Hacker TV – Hacker Course Buffer Overflow
A first step to become a true Hacker.
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Malware TV – Reverse Engineering
CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
Moran Cerf – Moth GrandSLAM winning story
Moran Cerf – Moth GrandSLAM winning story
Malware TV – Automatically Extracting Obfuscated Strings from Malware
The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …
Hacker TV – What Is An XXE Attack?
XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.